Security news that informs and inspires

All Articles

904 articles:

The Hacker Movie Sequels You Didn’t Know You Needed

Dennis Fisher, Zoe Lindsey, and Pete Baker got tired of waiting for Hollywood to make sequels to some of our favorite hacker movies, so we came up with some pitches for the sequels we'd like to see.

Podcast

DHS Exposes Chinese Malware Tools

The US government has published a detailed analysis of the Taidoor trojan it says is used by the Chinese government in network compromises.

Malware

Lawmakers Ask FTC to Investigate Data Brokers

A group of Congressional lawmakers urged the Federal Trade Commission to investigate ad-tech companies and data brokers who collect and sell consumers’ personal information.

Ftc, Data Privacy

Criminals Find a Way to Clone EMV Cards

The shift from payment cards with magnetic stripes to EMV chips was supposed to stomp out card cloning, except cybercriminals appear to have figured out a workaround.

Finance, Bank Security, Pci Dss

Microsoft to Remove Windows Updates Using SHA-1 Hash

Microsoft strikes another nail in the SHA-1 coffin with the announcement that all updates that had been signed using SHA-1 hash will be removed from the Microsoft Download Center.

Cryptography

Flaw in GRUB 2 Boot Loader Threatens Many Linux Systems

A buffer overflow (CVE-2020-10713) in the GRUB 2 boot loader can allow an attacker to gain code execution on many Linux systems and possibly some Windows computers.

Linux, Vulnerability

How Ransomware is Invading the Enterprise

Decipher editors Fahmida Y. Rashid and Dennis Fisher are joined by a panel of security experts to discuss the evolution of ransomware attacks and how groups are now focusing on enterprise targets.

Video

FBI Warns of DDoS Attacks Abusing Network Protocols

The Federal Bureau of Investigation warned in a “private industry notification” last week that attackers are increasingly using amplification techniques in distributed denial-of-service attacks. There has been an uptick in attack attempts since February, the agency’s Cyber Division said in the alert.

Ddos

Wyden: EARN IT Act a ‘Horrendous Effort’ to Regulate Speech

The EARN IT Act would create a flood of state laws regulating Internet use and curtail the use of encrypted services, Sen. Ron Wyden says.

Government, Encryption

Decipher Podcast: Katie Moussouris Returns

Katie Moussouris, hacker and CEO of Luta Security, joins Dennis Fisher for a long overdue conversation about vulnerability management, bug bounty programs, and assessing risk.

Podcast

MATA Cross-Platform Malware Framework Tied to Lazarus Group

A malware framework known as MATA that targets Windows, Linux, and macOS machines has been attributed to the Lazarus group tied to North Korea.

Apt

EU Court Strikes Down Privacy Shield

The European Union’s Court of Justice ruling to strike down Privacy Shield means non-European companies must provide privacy controls that align with European data protection laws for European users regardless of where that information is stored or transferred.

Privacy

Deciphering The Conversation

Zoe Lindsey and Peter Baker join Dennis Fisher to break down the 1974 Francis Ford Coppola paranoid classic The Conversation, a film that predicted today's surveillance culture and is a master class is social engineering and hacking.

Podcast

Russian Attackers Target COVID-19 Vaccine Research

US and UK intelligence agencies say a Russian attack group known as APT29 is targeting organizations associated with COVID-19 vaccine research.

Apt, Russia

Google Debuts Confidential VMs to Protect Cloud Data in Use

Google Cloud Confidential VMs, now in beta, allows customers to run workloads in the cloud on data that is encrypted while it's in use.

Google, Cloud